Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200411-16] zip: Path name buffer overflow Vulnerability Scan
Vulnerability Scan Summary
zip: Path name buffer overflow
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200411-16
(zip: Path name buffer overflow)
zip does not check the resulting path length when doing recursive folder compression.
A possible hacker could exploit this by enticing another user or web application to create an archive including a specially-crafted path name, potentially resulting in the execution of arbitrary code with the permissions of the user running zip.
There is no known workaround at this time.
All zip users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/zip-2.3-r4"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.